Vulnerability   
Search   
    Search 219043 CVE descriptions
and 99761 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.11481
Category:Remote file access
Title:mod_auth_any command execution
Summary:NOSUMMARY
Description:Description:

The remote host seems to be running mod_auth_any, an Apache Module
which allows the use of third-party authentication programs.

This module does not properly escape shell characters when a
username is supplied, and therefore an attacker may use this module
to :
- Execute arbitrary commands on the remote host
- Bypass the authentication process completely


Solution : The freebsd team made patches, available at
http://www.freebsd.org/cgi/cvsweb.cgi/ports/www/mod_auth_any/files/

Risk factor : High

Cross-Ref: BugTraq ID: 7448
Common Vulnerability Exposure (CVE) ID: CVE-2003-0084
http://www.securityfocus.com/bid/7448
Computer Incident Advisory Center Bulletin: N-090
http://www.ciac.org/ciac/bulletins/n-090.shtml
http://www.redhat.com/support/errata/RHSA-2003-113.html
RedHat Security Advisories: RHSA-2003:114
http://rhn.redhat.com/errata/RHSA-2003-114.html
XForce ISS Database: modauthany-command-execution(11893)
https://exchange.xforce.ibmcloud.com/vulnerabilities/11893
CopyrightThis script is Copyright (C) 2003 Renaud Deraison

This is only one of 99761 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2024 E-Soft Inc. All rights reserved.